|
|
DataMuseum.dkPresents historical artifacts from the history of: DKUUG/EUUG Conference tapes |
This is an automatic "excavation" of a thematic subset of
See our Wiki for more about DKUUG/EUUG Conference tapes Excavated with: AutoArchaeologist - Free & Open Source Software. |
top - metrics - downloadIndex: T h
Length: 6678 (0x1a16)
Types: TextFile
Names: »hunk.c«
└─⟦a0efdde77⟧ Bits:30001252 EUUGD11 Tape, 1987 Spring Conference Helsinki
└─⟦this⟧ »EUUGD11/gnu-31mar87/scheme/microcode/hunk.c«
/* Hey EMACS, this is -*- C -*- code! */
/****************************************************************
* *
* Copyright (c) 1984 *
* Massachusetts Institute of Technology *
* *
* This material was developed by the Scheme project at the *
* Massachusetts Institute of Technology, Department of *
* Electrical Engineering and Computer Science. Permission to *
* copy this software, to redistribute it, and to use it for any *
* purpose is granted, subject to the following restrictions and *
* understandings. *
* *
* 1. Any copy made of this software must include this copyright *
* notice in full. *
* *
* 2. Users of this software agree to make their best efforts (a)*
* to return to the MIT Scheme project any improvements or *
* extensions that they make, so that these may be included in *
* future releases; and (b) to inform MIT of noteworthy uses of *
* this software. *
* *
* 3. All materials developed as a consequence of the use of *
* this software shall duly acknowledge such use, in accordance *
* with the usual standards of acknowledging credit in academic *
* research. *
* *
* 4. MIT has made no warrantee or representation that the *
* operation of this software will be error-free, and MIT is *
* under no obligation to provide any services, by way of *
* maintenance, update, or otherwise. *
* *
* 5. In conjunction with products arising from the use of this *
* material, there shall be no use of the name of the *
* Massachusetts Institute of Technology nor of any adaptation *
* thereof in any advertising, promotional, or sales literature *
* without prior written consent from MIT in each case. *
* *
****************************************************************/
\f
/* File: HUNK.C
*
* Support for Hunk3s (triples)
*/
#include "scheme.h"
#include "primitive.h"
/* (HUNK3_CONS FIRST SECOND THIRD)
[Primitive number 0x28]
Returns a triple consisting of the specified values.
*/
Built_In_Primitive(Prim_Hunk3_Cons, 3, "HUNK3-CONS")
{ Primitive_3_Args();
Primitive_GC_If_Needed(Free + 3);
*Free++ = Arg1;
*Free++ = Arg2;
*Free++ = Arg3;
return Make_Pointer(TC_HUNK3, Free-3);
}
\f
/* (HUNK3_CXR TRIPLE N)
[Primitive number 0x29]
Returns the Nth item from the TRIPLE. N must be 0, 1, or 2.
*/
Built_In_Primitive(Prim_Hunk3_Cxr, 2, "HUNK3-CXR")
{ long Offset;
Primitive_2_Args();
Arg_1_Type(TC_HUNK3);
Arg_2_Type(TC_FIXNUM);
Range_Check(Offset, Arg2, 0, 2, ERR_ARG_2_BAD_RANGE);
return Vector_Ref(Arg1, Offset);
}
/* (HUNK3_SET_CXR TRIPLE N VALUE)
[Primitive number 0x2A]
Stores VALUE in the Nth item of TRIPLE. N must be 0, 1, or 2.
Returns (not good style to count on this) the previous contents.
*/
Built_In_Primitive(Prim_Hunk3_Set_Cxr, 3, "HUNK3-SET-CXR!")
{ long Offset;
Primitive_3_Args();
Arg_1_Type(TC_HUNK3);
Arg_2_Type(TC_FIXNUM);
Range_Check(Offset, Arg2, 0, 2, ERR_ARG_2_BAD_RANGE);
Side_Effect_Impurify(Arg1, Arg3);
return Swap_Pointers(Nth_Vector_Loc(Arg1, Offset), Arg3);
}
\f
/* (SYS_H3_0 GC-TRIPLE)
[Primitive number 0x8E]
Returns item 0 (the first item) from any object with a GC type
of triple. For example, this would access the operator slot of
a COMBINATION_2_OPERAND SCode item.
*/
Built_In_Primitive(Prim_Sys_H3_0, 1, "SYSTEM-HUNK3-CXR0")
{ Primitive_1_Arg();
Arg_1_GC_Type(GC_Triple);
return Vector_Ref(Arg1, 0);
}
/* (SYS_H3_1 GC-TRIPLE)
[Primitive number 0x91]
Returns item 1 (the second item) from any object with a GC type
of triple. For example, this would access the first operand
slot of a COMBINATION_2_OPERAND SCode item.
*/
Built_In_Primitive(Prim_Sys_H3_1, 1, "SYSTEM-HUNK3-CXR1")
{ Primitive_1_Arg();
Arg_1_GC_Type(GC_Triple);
return Vector_Ref(Arg1, 1);
}
/* (SYS_H3_2 GC-TRIPLE)
[Primitive number 0x94]
Returns item 2 (the third item) from any object with a GC type
of triple. For example, this would access the second operand
slot of a COMBINATION_2_OPERAND SCode item.
*/
Built_In_Primitive(Prim_Sys_H3_2, 1, "SYSTEM-HUNK3-CXR2")
{ Primitive_1_Arg();
Arg_1_GC_Type(GC_Triple);
return Vector_Ref(Arg1, 2);
}
\f
/* (SYS_H3_SET_0 GC-TRIPLE NEW-CONTENTS)
[Primitive number 0x8F]
Replaces item 0 (the first item) in any object with a GC type of
triple with NEW-CONTENTS. For example, this would modify the
operator slot of a COMBINATION_2_OPERAND SCode item. Returns
(bad style to rely on this) the previous contents.
*/
Built_In_Primitive(Prim_SH3_Set_0, 2, "SYSTEM-HUNK3-SET-CXR0!")
{ Primitive_2_Args();
Arg_1_GC_Type(GC_Triple);
Side_Effect_Impurify(Arg1, Arg2);
return Swap_Pointers(Nth_Vector_Loc(Arg1, 0), Arg2);
}
/* (SYS_H3_SET_1 GC-TRIPLE NEW-CONTENTS)
[Primitive number 0x92]
Replaces item 1 (the second item) in any object with a GC type
of triple with NEW-CONTENTS. For example, this would modify the
first operand slot of a COMBINATION_2_OPERAND SCode item.
Returns (bad style to rely on this) the previous contents.
*/
Built_In_Primitive(Prim_SH3_Set_1, 2, "SYSTEM-HUNK3-SET-CXR1!")
{ Primitive_2_Args();
Arg_1_GC_Type(GC_Triple);
Side_Effect_Impurify(Arg1, Arg2);
return Swap_Pointers(Nth_Vector_Loc(Arg1, 1), Arg2);
}
\f
/* (SYS_H3_SET_2 GC-TRIPLE NEW-CONTENTS)
[Primitive number 0x95]
Replaces item 2 (the third item) in any object with a GC type of
triple with NEW-CONTENTS. For example, this would modify the
second operand slot of a COMBINATION_2_OPERAND SCode item.
Returns (bad style to rely on this) the previous contents.
*/
Built_In_Primitive(Prim_SH3_Set_2, 2, "SYSTEM-HUNK3-SET-CXR2!")
{ Primitive_2_Args();
Arg_1_GC_Type(GC_Triple);
Side_Effect_Impurify(Arg1, Arg2);
return Swap_Pointers(Nth_Vector_Loc(Arg1, 2), Arg2);
}